-
Michael A. Roth commented on the post, Week 13 Materials Posted, on the site 9 years, 10 months ago
With such bad news circulating in the media in the last week or so, I found it rather humoring that North Korea decided to attack Sony Pictures for its upcoming film “The Interview” in which the film starts off with their Dear Leader’s face melting off – Raiders of the Lost Ark style. I guess they just hate Seth Rogen and James Franco, which is…[Read more]
-
Michael A. Roth commented on the post, Week 12 Materials Posted, on the site 9 years, 11 months ago
400 Hackers are Defending NATO in a Massive Cyberwar Game
NATO is launching its largest ever cyber-defense exercise. Over 400 experts consisting of technical, government, and cyber experts from states within the alliance will be tested on their ability to rapidly share information about cyber incidents, and test the abilities of participating…[Read more]
-
Michael A. Roth commented on the post, Week 10 Materials Posted, on the site 9 years, 11 months ago
After some email discussion with Professor Senko, I looked into asymmetric encryption and cryptography basics. As companies encrypt their information and data in some way or form, and hackers and cybercriminals are perpetually trying to break encryption we use, I figured it would be useful to look into the basics of how it all really works. The…[Read more]
-
Michael A. Roth commented on the post, Week 9 Materials Posted, on the site 9 years, 11 months ago
Key Point from the Readings (Vacca):
Networks are incredibly complex and can consist of many different components depending on its type, whether it is cellular, an intranet, WAN, or LAN. Due to their complexity, there are numerous risks associated with different networks and their components, and various methods and techniques cyber-criminals…[Read more] -
Michael A. Roth commented on the post, Progress Report for Week Ending, March 1, on the site 9 years, 11 months ago
Congress to the FBI: There’s “Zero Chance” We’ll Force Apple to Decrypt Phones
In light of the recent revealing of the NSA and other federal agencies spying and collecting all sorts of data and information from us, I found it particularly interesting that Congress is unwilling to force companies like Google and Apple to decrypt their data. For…[Read more]
-
Michael A. Roth commented on the post, Progress Report for Week Ending, February 23, on the site 9 years, 12 months ago
I forgot to post the link to my article in the news: http://www.detroitnews.com/story/business/autos/2014/10/22/automakers-working-prevent-vehicle-cyber-terrorism/17710785/
-
Michael A. Roth commented on the post, Progress Report for Week Ending, February 23, on the site 9 years, 12 months ago
Vacca, Chapter 36 – Network Forensics
Network forensics is necessary to investigate crime, fraudulent activity, inappropriate behavior, incident reconstruction, audit compliance, and recovering from system damage. Handling data in a forensic matter allows an organization to reconstruct the events surrounding systems and networks, such as in t…[Read more] -
Michael A. Roth commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 10 years ago
Key Point from Text:
Security management and controls are developed to ensure confidentiality, integrity, and availability of IT systems within an organization. Top level management must develop clear strategy, policies, and controls, and must be held accountable if these fail to be properly enforced. There are additional factors to be…[Read more]
-
Michael A. Roth commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 10 years ago
I thought it would be interesting to read about active hackers and what their viewpoints, motives, and reasoning is for this week’s articles.
I looked at two articles from Vice, one an interview with Russian hacker named “Fly”, who is known for activities in carding. He claims that hackers like him don’t actually make that much money, because…[Read more]
-
Michael A. Roth commented on the post, Week 4 Materials Posted, on the site 10 years, 1 month ago
Article in the News:
There is an Olympic equivalent to hacker competitions – The Global CyberLimpics, a computer network defense game based on ethical hacking, which seeks to increase awareness through increased education and ethics in information security. Teams are groups of hackers from countries all around the world and compete in a s…[Read more]
-
Michael A. Roth commented on the post, Week 3 Materials Posted, on the site 10 years, 1 month ago
Key Point from Readings:
As more and more information gets moved onto LAN’s, and thusly the internet where the number of users (and hackers) have grown exponentially over the years, organizations are now exposing themselves to more risk than ever before. It is therefore necessary for an organization to implement numerous network controls in o…[Read more] -
Michael A. Roth commented on the post, Progress Report for Week Ending, September 29, on the site 10 years, 1 month ago
Vacca – Chapter 1
I was surprised at the varying types and number of security controls and processes that exist to secure a company’s information assets, and how people within an organization appear to be the “weakest link” in terms of protecting an organization’s information. Usually through no fault of the employee/user, a company can have…[Read more]